Category Archives: Uncategorized

Public Leaks are Not Only a Government Concern

Heaps of Windows 10 internal builds, private source code leak online Unreleased 64-bit ARM versions, Server editions among dumped data. The data – some 32TB of official and non-public installation images and software blueprints that compress down to 8TB – … Continue reading

Posted in Uncategorized | Comments Off on Public Leaks are Not Only a Government Concern

Stealth tracking, double-agents, and de-bugging gone horribly wrong

Ultrasonic Beacons Are Tracking Your Every Movement More than 200 Android mobile applications listen surreptitiously for ultrasonic beacons embedded in audio that are used to track users and serve them with targeted advertising. | threatpost.com [Comment]. SilverPush continues to be … Continue reading

Posted in Uncategorized | Comments Off on Stealth tracking, double-agents, and de-bugging gone horribly wrong

May 5th, 2017 | The 3Ps: Phishing, Patching, and Passwords

Phishing – Google Docs and New Tactics Don’t click that Google Docs link! Gmail hijack mail spreads like wildfire Grabs contacts, peeks at inbox, spams everyone. | theregister.co.uk Google Docs Phishing Scam Doused After Catching Fire   A scam using Google Docs combined a phishing … Continue reading

Posted in Uncategorized | Comments Off on May 5th, 2017 | The 3Ps: Phishing, Patching, and Passwords

May 1, 2017 | Threat Reports

DBIR 2017: Highlights include: 88% of breaches fall into the nine patterns we first identified back in 2014. 95% of phishing attacks that led to a breach were followed by some sort of software installation. In the 2014 DBIR, ransomware was the … Continue reading

Posted in Uncategorized | Comments Off on May 1, 2017 | Threat Reports